diff options
author | Andrew Tridgell <tridge@samba.org> | 2007-05-23 07:44:51 +0000 |
---|---|---|
committer | Gerald (Jerry) Carter <jerry@samba.org> | 2007-10-10 14:52:48 -0500 |
commit | a2a49c5af702bd5cd8a84d9dcc57abf71497b22e (patch) | |
tree | 9bd9f8816674d4567adcaad04a816fbbcd175179 /source4/torture | |
parent | 182ad3f50c16fc0d139c7e9bc11dd2b823c32016 (diff) | |
download | samba-a2a49c5af702bd5cd8a84d9dcc57abf71497b22e.tar.gz samba-a2a49c5af702bd5cd8a84d9dcc57abf71497b22e.tar.bz2 samba-a2a49c5af702bd5cd8a84d9dcc57abf71497b22e.zip |
r23090: a test showing two netlogon pipes open at once, using the LogonEx ops
(This used to be commit 576dbdc8eece5c2fef743835c7cc255f02050ad3)
Diffstat (limited to 'source4/torture')
-rw-r--r-- | source4/torture/rpc/rpc.c | 1 | ||||
-rw-r--r-- | source4/torture/rpc/schannel.c | 95 |
2 files changed, 96 insertions, 0 deletions
diff --git a/source4/torture/rpc/rpc.c b/source4/torture/rpc/rpc.c index c3060d08d7..859b734899 100644 --- a/source4/torture/rpc/rpc.c +++ b/source4/torture/rpc/rpc.c @@ -183,6 +183,7 @@ NTSTATUS torture_rpc_init(void) torture_suite_add_simple_test(suite, "SAMLOGON", torture_rpc_samlogon); torture_suite_add_simple_test(suite, "SAMSYNC", torture_rpc_samsync); torture_suite_add_simple_test(suite, "SCHANNEL", torture_rpc_schannel); + torture_suite_add_simple_test(suite, "SCHANNEL2", torture_rpc_schannel2); torture_suite_add_simple_test(suite, "SRVSVC", torture_rpc_srvsvc); torture_suite_add_simple_test(suite, "SVCCTL", torture_rpc_svcctl); torture_suite_add_simple_test(suite, "EPMAPPER", torture_rpc_epmapper); diff --git a/source4/torture/rpc/schannel.c b/source4/torture/rpc/schannel.c index a80b94ab3b..0a1f8dd73b 100644 --- a/source4/torture/rpc/schannel.c +++ b/source4/torture/rpc/schannel.c @@ -30,6 +30,7 @@ #include "auth/gensec/schannel_proto.h" #include "libcli/auth/libcli_auth.h" #include "libcli/security/security.h" +#include "system/filesys.h" #define TEST_MACHINE_NAME "schannel" @@ -446,6 +447,8 @@ failed: return False; } + + /* a schannel test suite */ @@ -485,3 +488,95 @@ BOOL torture_rpc_schannel(struct torture_context *torture) return ret; } + +/* + test two schannel connections + */ +BOOL torture_rpc_schannel2(struct torture_context *torture) +{ + BOOL ret = True; + TALLOC_CTX *mem_ctx = talloc_new(torture); + struct test_join *join_ctx; + NTSTATUS status; + const char *binding = lp_parm_string(-1, "torture", "binding"); + struct dcerpc_binding *b; + struct dcerpc_pipe *p1 = NULL, *p2 = NULL; + struct cli_credentials *credentials1, *credentials2; + uint16_t acct_flags = ACB_WSTRUST; + uint32_t dcerpc_flags = DCERPC_SCHANNEL | DCERPC_SIGN; + TALLOC_CTX *test_ctx = talloc_named(mem_ctx, 0, "test_schannel2 context"); + + join_ctx = torture_join_domain(talloc_asprintf(mem_ctx, "%s2", TEST_MACHINE_NAME), + acct_flags, &credentials1); + if (!join_ctx) { + printf("Failed to join domain with acct_flags=0x%x\n", acct_flags); + talloc_free(test_ctx); + return False; + } + + credentials2 = talloc_memdup(mem_ctx, credentials1, sizeof(*credentials1)); + credentials1->netlogon_creds = NULL; + credentials2->netlogon_creds = NULL; + + status = dcerpc_parse_binding(test_ctx, binding, &b); + if (!NT_STATUS_IS_OK(status)) { + printf("Bad binding string %s\n", binding); + goto failed; + } + + b->flags &= ~DCERPC_AUTH_OPTIONS; + b->flags |= dcerpc_flags; + + printf("Opening first connection\n"); + status = dcerpc_pipe_connect_b(test_ctx, &p1, b, &dcerpc_table_netlogon, + credentials1, NULL); + if (!NT_STATUS_IS_OK(status)) { + printf("Failed to connect with schannel: %s\n", nt_errstr(status)); + goto failed; + } + + printf("Opening second connection\n"); + status = dcerpc_pipe_connect_b(test_ctx, &p2, b, &dcerpc_table_netlogon, + credentials2, NULL); + if (!NT_STATUS_IS_OK(status)) { + printf("Failed to connect with schannel: %s\n", nt_errstr(status)); + goto failed; + } + + credentials1->netlogon_creds = NULL; + credentials2->netlogon_creds = NULL; + + printf("Testing logon on pipe1\n"); + if (!test_netlogon_ex_ops(p1, test_ctx, credentials1, NULL)) { + printf("Failed to process schannel secured NETLOGON ops\n"); + ret = False; + } + + printf("Testing logon on pipe2\n"); + if (!test_netlogon_ex_ops(p2, test_ctx, credentials2, NULL)) { + printf("Failed to process schannel secured NETLOGON ops\n"); + ret = False; + } + + printf("Again on pipe1\n"); + if (!test_netlogon_ex_ops(p1, test_ctx, credentials1, NULL)) { + printf("Failed to process schannel secured NETLOGON ops\n"); + ret = False; + } + + printf("Again on pipe2\n"); + if (!test_netlogon_ex_ops(p2, test_ctx, credentials2, NULL)) { + printf("Failed to process schannel secured NETLOGON ops\n"); + ret = False; + } + + torture_leave_domain(join_ctx); + talloc_free(test_ctx); + return ret; + +failed: + torture_leave_domain(join_ctx); + talloc_free(test_ctx); + return False; +} + |